FIXIT MENU:
home about us contact us

WHAT'S AVAILABLE:
free scripts advanced scripts online tools great books web related tutorials contributed tutorials news archive geek toys!

SUPPORT:
help forum live chat help



Archive

Get Firefox! The most secure, and featured browser on the Internet.
RSS feed   enewsbar Live Subscribe    Add to MyYahoo

HTMLfixIT Archive for the ‘Phishing and Criminal Behavior’ Category




Friday, March 5th, 2010 by Don

Not that this isn’t really wrong — but if you have to steal something this is a cool way to do it I guess …
Drop in off a rope, hide from the motion detectors and security cameras. Only problem — gotta be an inside job.

No Comments »

Wednesday, August 12th, 2009 by Franki

Microsoft, who have been known to patent tiny and sometimes seemingly obvious things (timed mouse clicks for example) while riding on the shoulders of giants who often gave their truly revolutionary discoveries unencumbered by patents, has been bitten by the spurious software patent issue themselves. Microsoft Word it’s been ruled, is in breach of somebody else’s software patent (related to XML tagging). Better yet, an injunction forcing them to stop the sale of such infringing products has been granted also (Word and Vista). This has led to speculation that there may be something to the theory of Karma after all and that what goes around really might come around.

Sadly Microsoft has way too much money for this to make much of an impact on them. They’ll most likely pay the fine (290m), perhaps create a workaround and carry on business as usual. But still, the more money they have to hand out in the US, the EU and anywhere else that dislikes their practices, the more likely that at some point in the future, the board will realize that their version of business as usual isn’t really all that profitable anymore. Read more at Reuters.

No Comments »

Sunday, February 1st, 2009 by Don

This story was interesting. The US Department of Justice sets up phishing site apparently to test workers and see if they are practicing safe computing. Of course it was catch and release — no real data was released to the outside world, but I bet any employee who made the mistake of clicking through will regret having done so. Not a bad I idea I suppose, but if their system were set up correctly, their users shouldn’t be able to go phishing no matter what they do, should they?

No Comments »

Sunday, January 11th, 2009 by Don

More and more I see stories where criminals are caught by technology. Two that really struck my funny bone this past week are the guy in Columbus, Ohio, who sent text messages to his stolen cell phone thereby luring the thief to come on down and meet the police instead of the girls and drugs promised in the messages. The other one I enjoyed was a thief who took pictures on a cell phone, unaware that the phone was also uploading his images to the real owner’s server. Should help with the identification of course and in this case the police recognized the thief. (I think this is a story from last summer). I have heard many more stories of phones being located, cars being located, etc. Maybe people should earn things the old fashioned way once again and then they’ll have nothing to worry about.

No Comments »

Sunday, July 20th, 2008 by Franki

It seems that not all of the users of Firefox 3 were previous users of Firefox 2 upgrading to the newer version. Prior to the release of Firefox 3, the Mozilla browser had roughly 48% of our browser marketshare, making it the clear leader. Post Firefox 3 release, our Mozilla Firefox usage is up to nearly 65%. It remains to be seen how this trend shows up on other sites but it’s looking good for Firefox to make up some significant ground overall. We’ll know more not long after the end of July.

2 Comments »

Thursday, January 25th, 2007 by Don

After complaints alleged to have been filed by several states attorneys general, parents have now sued MySpace.com in Los Angeles. One of the persons interviews basically says suing MySpace over your minor child meeting a sexual predator on-line is a little like suing the phone company becuase your child talked to someone undesirable. Ultimately it would seem to me that much of the responsibility should fall with the parent. While I don’t know the particulars of this case, and thus decline to comment on it specifically, it would appear that this suit is over-reaching. You can find out more about the particulars at many sites such as this one that gives more particular details about the claims made in these cases.

If your child has access to the internet, you need to have the “don’t ever meet a stranger talk” with them. Just because you talk to someone doesn’t change their status and that is the lure or misconception I think many of us suffer from … that discussion results in someone becoming a friend.

No Comments »

Wednesday, December 13th, 2006 by Don

Geez have I read that enough lately? Today just one email address had 12 of this particular header subject sneak through the spam filters. I haven’t looked into it, but I assure you that you are unlikely to download Vista Ultimate as it is a huge download. Instead, you’ll undoubtely get a nice virus.

No Comments »







This site is totally free to use, you have absolutely no moral or legal obligations to help us continue.
There are however, some costs involved in running the site.

<random humor>
Plus Don's kid is a good runner and she goes through sneakers fast.
</random humor>

So if this site helped you find your way, perhaps you could consider contributing to our costs. Whatever amount you feel this site was worth to you would be just wonderful.
Use PayPal if you do decide to share and help us with the costs and in appreciation for our time and attention, or alternatively buy a book from our Bookstore..


  Time  in  Don's  part  of the world is:   April 23, 2014, 3:54 am
  Time in Franki's part of the world is:   April 23, 2014, 4:54 pm
  Don't worry neither one sleeps very long!



privacy policy :: support us :: home :: live chat help
contact us :: forum ::tutorials :: bookstore :: Site Map



      Valid XHTML 1.0!             powered by Apache Server
Pic 3 Pic 3

SEARCH:
USEFUL LINKS:

CIGHTML Firefox Thunderbird ClamWin WordPress SpyBot S&D TheGIMP Apache for Windows Registry Cleaners More cool stuff:

//-->

HTMLfixIT Site Stats.

Browser Statistics
Internet Explorer 85.88%
IE 717.63%
IE 62.3%
IE 50.00%
IE other8.6%
Moz Firefox 3.x3.03%
Moz Firefox 2.x0.18%
Moz Firefox 0.x/1.x26.65%
Netscape 8.x0.00%
NS 6+/Mozilla2.73%
Moz Seamonkey0.00%
K-meleon0.00%
Epiphany0.00%
Netscape 4.x0.00%
Opera 9.x0.00%
Opera 8.x0.00%
Opera 7.x0.42%
Opera 6.x0.00%
Opera other0.42%
Safari Mac/Intel5.21%
Safari Mac/PPC0.06%
Safari Windows25.2%
Google Chrome1.51%
Konqueror0.18%
Galeon0.00%
WebTV0.00%


Resolution Statistics
640 x 4800.25%
800 x 60026.14%
1024 x 76836.55%
1152 x 8640.25%
1280 x 80011.68%
1280 x 8540.00%
1280 x 102417.01%
1400 x 10500.00%
1600 x 12001.02%
1920 x 12007.11%
2560 x 10240.00%


OS Statistics
Windows 741.55%
Windows Vista2.4%
Windows 20033.91%
Windows XP20.86%
Windows 20000.36%
Windows NT40.05%
Windows 98/ME0.05%
Windows 950.00%
Linux/UNIX/BSD8.76%
Mac OSX8.03%
Mac Classic0.00%
Misc14.03%



New Windows Virus Alerts
also by sophos.

17 Apr 2011 Troj/Mdrop-DKE
17 Apr 2011 Troj/Sasfis-O
17 Apr 2011 Troj/Keygen-FU
17 Apr 2011 Troj/Zbot-AOY
17 Apr 2011 Troj/Zbot-AOW
17 Apr 2011 W32/Womble-E
17 Apr 2011 Troj/VB-FGD
17 Apr 2011 Troj/FakeAV-DFF
17 Apr 2011 Troj/SWFLdr-W
17 Apr 2011 W32/RorpiaMem-A

For details and removal instructions, click the virus in question.